All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.eclipse.jetty.ee8.security.authentication.ConfigurableSpnegoAuthenticator Maven / Gradle / Ivy

//
// ========================================================================
// Copyright (c) 1995 Mort Bay Consulting Pty Ltd and others.
//
// This program and the accompanying materials are made available under the
// terms of the Eclipse Public License v. 2.0 which is available at
// https://www.eclipse.org/legal/epl-2.0, or the Apache License, Version 2.0
// which is available at https://www.apache.org/licenses/LICENSE-2.0.
//
// SPDX-License-Identifier: EPL-2.0 OR Apache-2.0
// ========================================================================
//
package org.eclipse.jetty.ee8.security.authentication;

import java.io.IOException;
import java.io.Serializable;
import java.time.Duration;
import java.time.Instant;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import org.eclipse.jetty.ee8.nested.Authentication;
import org.eclipse.jetty.ee8.nested.Authentication.User;
import org.eclipse.jetty.ee8.nested.Request;
import org.eclipse.jetty.ee8.security.ServerAuthException;
import org.eclipse.jetty.ee8.security.UserAuthentication;
import org.eclipse.jetty.http.HttpHeader;
import org.eclipse.jetty.http.HttpMethod;
import org.eclipse.jetty.security.RoleDelegateUserIdentity;
import org.eclipse.jetty.security.SPNEGOLoginService;
import org.eclipse.jetty.security.SPNEGOUserPrincipal;
import org.eclipse.jetty.security.UserIdentity;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import static org.eclipse.jetty.ee8.nested.SessionHandler.ServletSessionApi.getOrCreateSession;

/**
 * 

A LoginAuthenticator that uses SPNEGO and the GSS API to authenticate requests.

*

A successful authentication from a client is cached for a configurable * {@link #getAuthenticationDuration() duration} using the HTTP session; this avoids * that the client is asked to authenticate for every request.

* * @see SPNEGOLoginService */ public class ConfigurableSpnegoAuthenticator extends LoginAuthenticator { private static final Logger LOG = LoggerFactory.getLogger(ConfigurableSpnegoAuthenticator.class); private final String _authMethod; private Duration _authenticationDuration = Duration.ofNanos(-1); public ConfigurableSpnegoAuthenticator() { this(SPNEGO_AUTH); } /** * Allow for a custom authMethod value to be set for instances where SPNEGO may not be appropriate * * @param authMethod the auth method */ public ConfigurableSpnegoAuthenticator(String authMethod) { _authMethod = authMethod; } @Override public String getAuthMethod() { return _authMethod; } /** * Get the authentication duration. * @return the authentication duration */ public Duration getAuthenticationDuration() { return _authenticationDuration; } /** *

Sets the duration of the authentication.

*

A negative duration means that the authentication is only valid for the current request.

*

A zero duration means that the authentication is valid forever.

*

A positive value means that the authentication is valid for the specified duration.

* * @param authenticationDuration the authentication duration */ public void setAuthenticationDuration(Duration authenticationDuration) { _authenticationDuration = authenticationDuration; } /** * Only renew the session id if the user has been fully authenticated, don't * renew the session for any of the intermediate request/response handshakes. */ @Override public UserIdentity login(String username, Object password, ServletRequest servletRequest) { Request baseRequest = Request.getBaseRequest(servletRequest); if (baseRequest == null) return null; RoleDelegateUserIdentity user = (RoleDelegateUserIdentity) _loginService.login(username, password, baseRequest.getCoreRequest(), getOrCreateSession(servletRequest)); if (user != null && user.isEstablished()) renewSession(baseRequest, baseRequest.getResponse()); return user; } @Override public Authentication validateRequest(ServletRequest req, ServletResponse res, boolean mandatory) throws ServerAuthException { if (!mandatory) return new DeferredAuthentication(this); HttpServletRequest request = (HttpServletRequest) req; HttpServletResponse response = (HttpServletResponse) res; String header = request.getHeader(HttpHeader.AUTHORIZATION.asString()); String spnegoToken = getSpnegoToken(header); HttpSession httpSession = request.getSession(false); // We have a token from the client, so run the login. if (header != null && spnegoToken != null) { RoleDelegateUserIdentity identity = (RoleDelegateUserIdentity) login(null, spnegoToken, request); if (identity.isEstablished()) { if (!DeferredAuthentication.isDeferred(response)) { if (LOG.isDebugEnabled()) LOG.debug("Sending final token"); // Send to the client the final token so that the // client can establish the GSS context with the server. SPNEGOUserPrincipal principal = (SPNEGOUserPrincipal) identity.getUserPrincipal(); setSpnegoToken(response, principal.getEncodedToken()); } Duration authnDuration = getAuthenticationDuration(); if (!authnDuration.isNegative()) { if (httpSession == null) httpSession = request.getSession(true); httpSession.setAttribute(UserIdentityHolder.ATTRIBUTE, new UserIdentityHolder(identity)); } return new UserAuthentication(getAuthMethod(), identity); } else { if (DeferredAuthentication.isDeferred(response)) return Authentication.UNAUTHENTICATED; if (LOG.isDebugEnabled()) LOG.debug("Sending intermediate challenge"); SPNEGOUserPrincipal principal = (SPNEGOUserPrincipal) identity.getUserPrincipal(); sendChallenge(response, principal.getEncodedToken()); return Authentication.SEND_CONTINUE; } } else // No token from the client; check if the client has logged in // successfully before and the authentication has not expired. if (httpSession != null) { UserIdentityHolder holder = (UserIdentityHolder) httpSession.getAttribute(UserIdentityHolder.ATTRIBUTE); if (holder != null) { UserIdentity identity = holder._userIdentity; if (identity != null) { Duration authnDuration = getAuthenticationDuration(); if (!authnDuration.isNegative()) { boolean expired = !authnDuration.isZero() && Instant.now().isAfter(holder._validFrom.plus(authnDuration)); // Allow non-GET requests even if they're expired, so that // the client does not need to send the request content again. if (!expired || !HttpMethod.GET.is(request.getMethod())) return new UserAuthentication(getAuthMethod(), identity); } } } } if (DeferredAuthentication.isDeferred(response)) return Authentication.UNAUTHENTICATED; if (LOG.isDebugEnabled()) LOG.debug("Sending initial challenge"); sendChallenge(response, null); return Authentication.SEND_CONTINUE; } private void sendChallenge(HttpServletResponse response, String token) throws ServerAuthException { try { setSpnegoToken(response, token); response.sendError(HttpServletResponse.SC_UNAUTHORIZED); } catch (IOException x) { throw new ServerAuthException(x); } } private void setSpnegoToken(HttpServletResponse response, String token) { String value = HttpHeader.NEGOTIATE.asString(); if (token != null) value += " " + token; response.setHeader(HttpHeader.WWW_AUTHENTICATE.asString(), value); } private String getSpnegoToken(String header) { if (header == null) return null; String scheme = HttpHeader.NEGOTIATE.asString() + " "; if (header.regionMatches(true, 0, scheme, 0, scheme.length())) return header.substring(scheme.length()).trim(); return null; } @Override public boolean secureResponse(ServletRequest request, ServletResponse response, boolean mandatory, User validatedUser) { return true; } private static class UserIdentityHolder implements Serializable { private static final String ATTRIBUTE = UserIdentityHolder.class.getName(); private final transient Instant _validFrom = Instant.now(); private final transient UserIdentity _userIdentity; private UserIdentityHolder(UserIdentity userIdentity) { _userIdentity = userIdentity; } } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy